2023 2024 EduVark > Education Discussion > Question Papers


  #2  
July 8th, 2014, 11:44 AM
Super Moderator
 
Join Date: Mar 2012
Re: Bank of Baroda last year clerical cadre question papers

As you want to get the Bank of Baroda last year clerical cadre question papers so here is the information of the same for you:

Some content of the file has been given here:


Directions—(Q. 1–15) Read the following passage carefully and answer the
questions given below it. Certain words/phrases have been printed in bold
to help you locate them while answering some of the questions.
Mihir and Mahadev lived in the same village. While Mahadev owned the
largest shop in the village, Mihir was a poor farmer. Both had large
families, with many sons, daughtersin-law and grandchildren. One day,
Mihir, tired of not being able to make ends meet, decided to leave the
village and move to the city where they were sure to make enough to feed
everyone. They said their goodbyes, packed their few belongings and set
off. When night fell, they stopped under a large tree. There was a stream
running nearby, where they could refresh themselves. Mihir told his sons
to clear the area below the tree. He told his wife to fetch water. He
instructed his daughters-in-law to make up the fire and started cutting
wood from the tree himself. Now, in the branches of that tree sat a
thief. He watched as Mihir’s family worked together. He also noticed they
had nothing to cook. Mihir’s wife too thought the same, for she said to
her husband, “Everything is ready. But what shall we eat ?” Mihir raised
his hands to heaven and said, “Don’t worry. He is watching all this from
above. He will help us.”
The thief was worried. He had seen that the family was large and worked
well together. Surely they did not know he was hiding in the branches ?
He decided to make a quick getaway. He climbed down swiftly when they
were not looking and ran for his life. But, he left behind his bundle of
stolen jewels and money, which dropped down into Mihir’s lap. He opened
it and jumped with joy when he saw the contents. The family promptly
gathered its belongings and returned to the village. There was great
excitement when they told everyone how they got rich.
Mahadev thought this was a nice quick way to earn some money ! He
commanded his family to pack some clothes and they set off as if on a
journey. They stopped under the same tree and Mahadev started commanding
everyone as Mihir had done. But no one in his family was willing to obey
orders. They were used to having servants wait on them – so the one who
went to the river to fetch water had a nice bath. The one who went to
gather wood for the fire went off to sleep beneath the tree. And Mahadev
only ordered everyone about, not bothering to do anything himself.
Meanwhile the thief had returned to the tree. He noticed the family
members were greedy and selfish. They would never be able to put up a
fight together. Then, Mahadev and his wife started the conversation that
they had rehearsed carefully. Mahadev’s wife said, “Everything is ready.
But what shall we eat ?” Mahadev raised his hands upwards and said,
“Don’t worry. He is watching all this from above. He will help us”.
At this, the thief jumped down from the tree, knife in hand. Seeing him,
everyone started running helter skelter to save themselves. The thief
stole everything. Mahadev and his family had to return to the village
empty-handed, having lost all the jewellery and gold they had taken with
them.
1. Which of the following cannot be said about Mihir’s family ?
(a) They respected and obeyed Mihir.
(b) They were so poor that they sometimes had to starve.
(c) They had no friends in the village when they were poor.
(A) None
(B) Only (c)
(C) Only (b) and (c)
(D) Only (b)
(E) All (a), (b) and (c)
Ans : (C)
2. Why did Mihir and his family decide to camp under the ‘thief’s tree’ ?
(A) Being a large family they knew they could capture the thief
(B) It was a convenient spot to camp for the night
(C) It was the only tree large enough to shelter the whole family
(D) there was a stream nearby and wood to build a house
(E) Exhausted after the day’s travel they couldn’t walk any more
Ans : (B)
3. Why did the thief leave the valuables he had stolen behind ?
(A) Seeing Mihir’s faith in God the thief was filled with remorse
(B) Feeling sorry for Mihir’s family he decided to donate the valuables
to them
(C) He was afraid that God would punish him for stealing
(D) In his hurry to run away he forget to take the valuables along
(E) He was confident that they were so well hidden that they would not be
found
Ans : (D)
4. Which of the following best describes Mahadev ?
(A) He was a rich businessman
(B) He bullied his wife so she obeyed him
(C) He paid his servants well to look after his family’s needs
(D) He was greedy and had cheated Mihir
(E) He was brave and decided to trick the thief
Ans : (A)
5. Why did Mihir’s family return to the village ?
(A) To show off their newfound wealth
(B) To buy back their land and start a business
(C) They had no need to shift to the city
(D) To share their wealth with the other villagers
(E) They wanted to sing God’s praises to all the villagers
Ans : (C)
6. What made Mihir utter the phrase, “He is watching all this from
above.” ?
(A) He had spotted the thief and wanted to frighten him off
(B) He was telling his wife to trust God to look after them
(C) It was a warming to his family members to stick together
(D) He was begging the thief for help to feed his family
(E) None of these
Ans : (B)
7. Which of the following is TRUE in the context of the passage ?
(A) Mahadev planned to seek his fortune in the city as Mihir had
(B) Mihir’s family preferred to live in the city
(C) Mahadev had no intention of moving to the city
(D) Mahadev lost his entire life savings to the thief
(E) The thief only robbed those whom he did not like
Ans : (D)
8. Why did the thief return to the tree ?
(A) To plot how to get his money back
(B) He thought no one would look for him there
(C) To keep a watch on Mahadev’s family
(D) Not mentioned in the passage
(E) None of these
Ans : (D)
9. Why was the thief not afraid of Mahadev’s family ?
(A) They had not brought their servants along to protect them
(B) Seeing their wealth he suspected them of stealing his loot
(C) He had weapons to defend himself
(D) Mahadev’s family was not as large as Mihir’s
(E) None of these
Ans : (E)
10. How did the villagers react to Mihir’s new found wealth ?
(A) They tried hard to coax him to reveal the secret of his wealth
(B) They followed his example and became more devout
(C) They pretended to happy for him but were secretly jealous
(D) They each plotted to visit the tree and get rich quickly
(E) None of these
Ans : (E)
Directions—(Q. 11–13) Which of the following is most similar in meaning
to the word given in bold as used in the passage.
11. make(A) earn
(B) estimate
(C) prepare
(D) build
(E) settle
Ans : (A)
12. lost
(A) defeated
(B) failed
(C) forfeited
(D) wasted
(E) destroyed
Ans : (D)
13. getaway
(A) holiday
(B) freedom
(C) fantasy
(D) escape
(E) relaxation
Ans : (D)
Directions—(Q. 14–15) Which of the following is most opposite in meaning
of the word given in bold as used in the passage.
14. rehearsed(A) repeated
(B) forced
(C) fake
(D) unplanned
(E) effortless
Ans : (D)
15. willing
(A) oblige
(B) reluctant
(C) distracted
(D) determined
(E) obstacle
Ans : (B)
Directions—(Q. 16–25) Read each sentence to find out whether there is any
grammatical error or idiomatic error in it. The error, if any, will be in
one part of the sentence. The letter of that part is the answer. If there
is no error the answer is (E). (Ignore errors of punctuation, if any)
16. The majority of the population believes (A) / that the stock market
is recovered (B) / and that it is the (C) / right time to buy shares. (D)
No error (E)
Ans : (B)
17. Seema’s new office is close (A) / to her residence so (B) / she will
not longer (C) / have to travel by train. (D) No error (E)
Ans : (C)
18. In the present guidelines, (A) / the bank is required to obtain (B) /
a photograph from any person (C) / who wishes to open an account. (D) No
error (E)
Ans : (C)
19. Chetan puts in a lot (A) / of effort to ensure (B) / that the scheme
was (C) / launched in March. (D) No error (E)
Ans : (C)
20. As our economy is (A) / experiencing a recession, banks (B) / have
became very cautious (C) / about giving loans. (D) No error (E)
Ans : (C)
21. After retiring she spent (A) / most of her time teaching young (B) /
doctors and motivating themselves (C) / to work in rural areas. (D) No
error (E)
Ans : (A)
22. Since this foreign bank has (A) / not performed very good this year
(B) / it will not be setting / up any new branches. (D) No error (E)
Ans : (B)
23. Our Chairman is deeply concerned (A) / about the environment (B) /
and plans to take some steps to reduce the (C) / pollution caused by our
factories. (D) No error (E)
Ans : (E)
24. He was afraid that his parents (A) / would not allow him to (B) /
make the film so he did (C) / not tell them about it. (D) No error (E)
Ans : (E)
25. I was previously posted (A) / in Singapore and it (B) / took me a
long time (C) / to accustom to the food. (D) No error (E)
Ans : (D)
Directions—(Q. 26–30) In each question below a sentence with four words
printed in bold type is given. These are lettered as (A), (B), (C) and
(D). One of these four words printed in bold may be either wrongly spelt
or inappropriate in the context of the sentence. Find out the word which
is wrongly spelt or inappropriate if any. The letter of that word is your
answer. If all the words printed in bold are correctly spelt and also
appropriate in the context of the sentence, mark (E) i.e. ‘All correct’
as your answer.
26. He was a member (A) of the original (B) committee which drafted (C)
these recommendations. (D) All correct (E)
Ans : (B)
27. Do not procede (A) with the transfer (B) of funds until you receive
further (C) instructions. (D) All correct (E)
Ans : (A)
28. Our branch is located (A) in a remote (B) area where water is
scarcity (C) available. (D) All correct (E)
Ans : (C)
29. To gain (A) their support, (B) you must convenience (C) them of the
benefits (D) of the proposal. All correct (E)
Ans : (C)
30. The deal we negotiated (A) has not been approved (B) by RBI and needs
(C) to be revized. (D) All correct (E)
Ans : (D)
Directions—(Q. 31–35) Rearrange the following six sentences (a), (b),
(c), (d), (e) and (f) in the proper sequence to form a meaningful
paragraph; then answer the questions given below them.
(a) A few minutes later he was hauled back on board the ship, on the
captain’s orders.
(b) One of the crew began to complain and moan about the situation and no
one could silence him.
(c) Marvelling at the change, the passengers asked for an explanation, to
which the captain replied, “We never appreciate how well off we are in a
situation until we fall into a worse one”.
(d) During a voyage a great storm arose.
(e) In exasperation the captain ordered him to be thrown overboard.
(f) To everyone’s surprise, the man immediately went back to his post and
silently began to work.
31. Which of the following should be the THIRD sentence after
rearrangement ?
(A) (a)
(B) (b)
(C) (c)
(D) (d)
(E) (e)
Ans : (E)
32. Which of the following should be the FIRST sentence after
rearrangement ?
(A) (a)
(B) (b)
(C) (c)
(D) (d)
(E) (e)
Ans : (D)
33. Which of the following should be the LAST (SIXTH) sentence after
rearrangement ?
(A) (b)
(B) (c)
(C) (d)
(D) (e)
(E) (f)
Ans : (E)
34. Which of the following should be the SECOND sentence after
rearrangement ?
(A) (b)
(B) (c)
(C) (d)
(D) (e)
(E) (f)
Ans : (A)
35. Which of the following should be the FIFTH sentence after
rearrangement ?
(A) (a)
(B) (b)
(C) (c)
(D) (d)
(E) (f)
Ans : (C)
Directions—(Q. 36–40) Which of the phrases (A), (B), (C) and (D) given
below should replace the phrase given in bold in the following sentence
to make the sentence meaningful and grammatically correct. If the
sentence is correct as it is and no correction is required, mark (E) as
the answer.
36. Ensure we have the necessary clearance is the responsibility of the
legal department.
(A) Ensuring we have
(B) To ensure having
(C) We have been ensured
(D) Ensuring us having
(E) No correction required
Ans : (B)
37. They have decided to go ahead and implement which was discussed at
last month’s conference in Chennai.
(A) What we had discussed
(B) Whatever discussion
(C) That being discussed
(D) Which has been discussed
(E) No correction required
Ans : (A)
38. To reduce costs, we should replace our current system by much
efficient one.
(A) Through more efficient
(B) Efficiently by
(C) With a more efficient
(D) For better efficiency
(E) No correction required
Ans : (C)
39. Staff in the district offices can easily monitor whether the payments
are being made in time.
(A) Easily be monitored
(B) Monitor easier whether
(C) Easy to monitor that
(D) Monitor easily
(E) No correction required
Ans : (E)
40. Most of the managers whom involved in the deal had previously worked
for multinational banks.
(A) Whose involved
(B) Involvement with
(C) Involving whom
(D) Involved in
(E) No correction required
Ans : (D)
Directions—(Q. 41–50) In the following passage there are blanks, each of
which has been numbered. These numbers are printed below the passage and
against each, five words are suggested, one of which fits the blank
appropriately. Find out the appropriate word in each case.
One rainy day while driving me home from school my father stopped to
offer a frail old man a lift. Though he was headed in the opposite
…(41)…, my father insisted. By the time we …(42)… home it was late and I
was tired and …(43)… with my father.
That night, my father …(44)… me a bedtime story as usual–A …(45)… Emperor
was once asked “Sire, while you …(46)… rich and powerful, your teacher
doesn’t even …(47)… a piece of land yet you visit him, …(48)… don’t you
summon him to court ?” The Emperor …(49)… and said, “You are mistaken, my
teacher is …(50)… than I am. My land can be lost in a war but he
possesses knowledge which can never be stolen.” “The old man was my
teacher.” my father concluded.
I have never forgotten the lesson my father ‘taught’ me that day.
41. (A) route
(B) manner
(C) direction
(D) side
(E) way
Ans : (C)
42. (A) left
(B) arrived
(C) return
(D) gone
(E) reach
Ans : (B)
43. (A) complained
(B) annoying
(C) hungry
(D) upset
(E) worried
Ans : (D)
44. (A) taught
(B) described
(C) told
(D) reads
(E) related
Ans : (C)
45. (A) greedy
(B) honest
(C) foolish
(D) mighty
(E) cruel
Ans : (D)
46. (A) are
(B) being
(C) were
(D) so
(E) seem
Ans : (A)
47. (A) own
(B) earn
(C) acquire
(D) possessed
(E) has
Ans : (A)
48. (A) however
(B) but
(C) instead
(D) when
(E) why
Ans : (E)
49. (A) shouted
(B) silent
(C) thinks
(D) smiled
(E) prayed
Ans : (D)
50. (A) powerful
(B) wise
(C) wealthy
(D) stronger
(E) richer
Ans : (E)



1. Programs from the same developer , sold bundled together , that
provide better integration and share common features , toolbars and menus
are known as ....
(A) software suites
(B) integrated software packages
(C) software processing packages
(D) personal information managers
(E) none of these
Ans : (A)
2. A data warehouse is which of the following ?
(A) Can be updated by the end users
(B) Contains numerous naming conventions and formats
(C) Organized around important subject areas
(D) Contains only current data
(E) None of these
Ans : (C)
3. ______________ servers store and manages files for network users.
(A) Authentication
(B) Main
(C) Web
(D) File
(E) None of these
Ans : (D)
4. All of the following are examples of real security and privacy risks
Except _____
(A) hackers
(B) spam
(C) viruses
(D) identify theft
(E) None of these
Ans : (B)
5. ___________ terminals (formerly known as cash registers) are often
connected to complex inventory and sales computer systems .
(A) Data
(B) Sales
(C) Query
(D) (Point-of-sale (POS)
(E) None of these
Ans : (B)
6. The OSI model is divided into _______ processes called layers.
(A) five
(B) six
(C) seven
(D) eight
(E) None of these
Ans : (C)
7. System software is the set of programs that enables your computer's
hardware devices and ______ software to work together.
(A) management
(B) processing
(C) utility
(D) application
(E) None of these
Ans : (D)
8. ________ are specially designed computer chips reside inside other
devices, such as your car or your electronic thermostat.
(A) Servers
(B) Embedded computers
(C) Robotic computers
(D) Mainframes
(E) None of these
Ans : (B)
9. The following are all computing devices , except.........
(A) notebook computers
(B) cellular telephones
(C) digital scanners
(D) personal digital assistants
(E) None of these
Ans : (C)
10. in a ring topology , the the computer in possession of the ______ can
trasmit data
(A) packet
(B) data
(C) access method
(D) token
(E) None of these
Ans : (D)
11. This part of operating system manages the essential peripherals, such
as the keyboard, screen , disk drives, and parallel and serial ports ____
(A) basic input/output system
(B) secondary input/output system
(C) peripheral input/output system
(D) marginal input/output system
(E) None of these
Ans : (A)
12. ________ Viruses are often transmitted by a floppy disk left in the
floppy drive
(A) Trojan horse
(B) Boot sector
(C) Script
(D) Logic bomb
(E) None of these
Ans : (B)
13. ________ controls the way in which the computer system functions and
provides a meAns : by which users can interact with the computer
(A) The platform
(B) Application software
(C) Operating system
(D) The motherboard
(E) None of these
Ans : (C)
14. Servers are computers that provide resources to other computers
connected to a ___________
(A) mainframe
(B) network
(C) supercomputer
(D) client
(E) None of these
Ans : (B)
15. A goal of data mining includes which of the following?
(A) To explain some observed event or condition
(B) To confirm that data exists
(C) To analyze data for expected relationships
(D) To create a new data warehouse
(E) None of these
Ans : (A)
16. URL stands for ........
(A) Universal Research List
(B) Universal Resource List
(C) Uniform Resource Locator
(D) Uniform Research Locator
(E) None of these
Ans : (C)
17. A database management system (DBMS) is a ............
(A) hardware system used to create , maintain and provide controlled
access to a database
(B) hardware system used to create, maintain, and provide uncontrolled
access to a database.
(C) software system used to create, maintain, and provide uncontrolled
access to a database.
(D) software system used to create, maintain, and provide controlled
access to a database.
(E) None of these
Ans : (D)
18. Which of the following is NOT a goal of transaction processing system
?
(A) Capture , process and store transactions
(B) Produce a variety of documents related to routine business activities
(C) Reduce manual effort associated with processing business transactions
(D) Produce standard reports used for management decision making
(E) None of these
Ans : ()
19. A Proxy server is used for which of the following?
(A) To provide security against unauthorized users
(B) To process client requests for web pages
(C) To process client requests for database access
(D) To provide TCP/IP
(E) None of these
Ans : (B)
20. When data changes in multiple lists and all lists are not updated,
this causes:
(A) data redundancy
(B) information overload
(C) duplicate data
(D) data inconsistency
(E) None of these
Ans : (D)
21. _____________ are words that a programming language has set aside for
its own use.
(A) Control worlds
(B) Reserved words
(C) Control structures
(D) Reserved keys
(E) None of these
Ans : (B)
22. What is the primary difference between a virus and a worm?
(A) A worm has the ability to self-propagate from an infected user's
computer to other computers
(B) A worm is usually written by a cracker: Script bunnies do not have
the skills to develop a worm program
(C) A virus is very harmful to the computers it infects : a worm is not a
serious a problem
(D) Anti-virus software is effective in fighting viruses but not worms
(E) None of these
Ans : ()
23. ______ describe what is database fields.
(A) Structures
(B) Field markers
(C) Field definition
(D) Field names
(E) None of these
Ans : (D)
24. You must install a (n) ____________ on a network if you want to share
a broadband Internet connection.
(A) router
(B) modem
(C) node
(D) cable
(E) None of these
Ans : (A)
25. A goal of normalization is to __________
(A) minimize the number of relationships
(B) minimize the number of entities
(C) minimize the number of tables
(D) minimize the number of redundancy
(E) None of these
Ans : (D)
26. Granting an outside organization access to internet web pages is
often implemented using a (n) ____
(A) extranet
(B) intranet
(C) internet
(D) hacker
(E) None of these
Ans : (A)
27. Which term identifies a specific computer on the web and the main
page of the entire site
(A) URL
(B) Web site address
(C) Hyperlink
(D) Domain name
(E) None of these
Ans : (A)
28. The code that relational database management systems use to perform
their database task is referred to as .....
(A) QBE
(B) SQL
(C) OLAP
(D) Sequel Server
(E) None of these
Ans : (B)
29. Chip is a common nickname for a (n):
(A) transistor
(B) resistor
(C) integrated circuit
(D) semiconductor
(E) None of these
Ans : (C)
30. The purpose of the primary key in a database is to:
(A) unlock the database
(B) provide a map of the data
(C) uniquely identify a record
(D) establish constraints on database operations.
(E) None of these
Ans : (B)
31. A _________ contains specific rules and words that express the
logical steps of an algorithm.
(A) programming language
(B) syntax
(C) programming structure
(D) logic chart
(E) None of these
Ans : ()
32. The design of the network is called the network:
(A) architecture
(B) server
(C) transmission
(D) type
(E) None of these
Ans : (A)
33. The most frequently used instructions of a computer program are
likely to be fetched from:
(A) the hard disk
(B) cache memory
(C) RAM
(D) registers
(E) None of these
Ans : (B)
34. The ____________ contains data descriptions and defines the name,
data type, and length of each field in the database.
(A) data dictionary
(B) data table
(C) data record
(D) data field
(E) None of these
Ans : (A)
35. Personal logs or journal entries posted on the Web are known as:
(A) listservs
(B) Webcasts
(C) blogs
(D) subject directories
(E) None of these
Ans : (C)
36. A(n) _______ uses pictures (called icons) and menus displayed on the
screen to send commands to the computer system.
(A) command - based user interface
(B) GUI
(C) system utility
(D) API
(E) None of these
Ans : (B)
37. The _____ manual tells you how to use a software program.
(A) documentation
(B) programming
(C) technical
(D) user
(E) None of these
Ans : ()
38. Which of the following is NOT a type of broadband Internet
connection?
(A) Cable
(B) DSL
(C) Dial-up
(D) Satellite
(E) None of these
Ans : (C)
39. Software, such as viruses, worms and Trojan horses, that has a
malicious intent, is known as:
(A) spyware
(B) adware
(C) spam
(D) malware
(E) None of these
Ans : (D)
40. Making a field ______ meAns : that it cannot be left blank.
(A) numeric
(B) required
(C) calculated
(D) validated
(E) None of these
Ans : (B)
41. _________ is the process of finding errors in software code.
(A) Debugging
(B) Compiling
(C) Testing
(D) Running
(E) None pf these
Ans : ()
42. ____________ are viruses that are triggered by the passage of time or
on a certain date.
(A) Boot-sector viruses
(B) Macro viruses
(C) Time bombs
(D) Worms
(E) None of these
Ans : (C)
43. Linux is a (n) ____________ operating system.
(A) open-source
(B) Microsoft
(C) Windows
(D) Mac
(E) None of these
Ans : (A)
44. What is a backup?
(A) Restoring the information backup
(B) An exact copy of a system's information
(C) The ability to get a system up and running in the event of a system
crash or failure
(D) All of these
(E) None of these
Ans : (D)
45. Which of the following places the common data elements in order from
smallest to largest
(A) character, file, record, field, database
(B) character, record, field, database, file
(C) character, field, record, file, database
(D) Bit, byte, character, record, field, file, database,
(E) None of these
Ans : (C)
46. The internet is ......
(A) a large network of networks
(B) an internal communication system for a business
(C) a communication system for the Indian government
(D) All of these
(E) None of these
Ans : (D)
47. ____________ are lists of commands that appear on the screen.
(A) GUIs
(B) Icons
(C) Menus
(D) Windows
(E) None of these
Ans : (C)
48. Which of the following statements is FALSE concerning file names?
(A) Files may share the same name or the same extension but not both
(B) Every file in the same folder must have a unique name
(C) File extension is another name for file type
(D) The file extension comes before the dot (.) followed by the file name
(E) None of these
Ans : (D)
49. Verification of a login name and password is known as:
(A) configuration
(B) accessibility
(C) authentication
(D) logging in
(E) None of these
Ans : (C)
50. Which of the following would most likely NOT be a symptom of a virus?
(A) Existing program files and icons disappear.
(B) The CD-ROM stops functioning.
(C) The Web browser opens to an unusual home page.
(D) Odd messages or images are displayed on the screen.
(E) None of these
Ans : (B)


Quick Reply
Your Username: Click here to log in

Message:
Options



All times are GMT +5. The time now is 02:42 AM.


Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2024, vBulletin Solutions Inc.
Content Relevant URLs by vBSEO 3.6.0

1 2 3 4 5 6 7 8